Monday, June 23, 2025
  • About us
  • Economic Calendar
  • Price Predictions
  • Coins Alerts
  • Crypto Portfolio Tracker
  • Exclusively from Our Partners
Cryptheory
  • Cryptocurrency List
  • Cryptocurrency
    • Cryptocurrency Exchanges
      • Top exchanges for trading Bitcoin derivatives
      • How to buy bitcoin without KYC
      • How to Trade Bitcoin – best platforms
      • Best platforms to buy Bitcoin by debit or credit card
      • Platforms for Grid Trading
      • BYDFi: Review and Guide
      • BingX: Review and Guide
      • Kraken: Review and Guide
      • Bybit: Review and Guide
      • Bitpanda: Review and Guide
      • Phemex: Review and Guide
      • Huobi: Quick Guide
      • Binance: Review and Guide
        • Binance Futures Guide
    • Bitcoin
    • Tether
    • XRP
    • Dogecoin
    • Avalanche
    • Stellar
    • The Open Network
  • crypto news
  • Crypto Exchanges Info
  • Analysis
  • Attractions
No Result
View All Result
  • Cryptocurrency List
  • Cryptocurrency
    • Cryptocurrency Exchanges
      • Top exchanges for trading Bitcoin derivatives
      • How to buy bitcoin without KYC
      • How to Trade Bitcoin – best platforms
      • Best platforms to buy Bitcoin by debit or credit card
      • Platforms for Grid Trading
      • BYDFi: Review and Guide
      • BingX: Review and Guide
      • Kraken: Review and Guide
      • Bybit: Review and Guide
      • Bitpanda: Review and Guide
      • Phemex: Review and Guide
      • Huobi: Quick Guide
      • Binance: Review and Guide
        • Binance Futures Guide
    • Bitcoin
    • Tether
    • XRP
    • Dogecoin
    • Avalanche
    • Stellar
    • The Open Network
  • crypto news
  • Crypto Exchanges Info
  • Analysis
  • Attractions
No Result
View All Result
Cryptheory
No Result
View All Result

How to Become a Hacker in 2020 #3| Social Engineering

by cryptheory
March 29, 2025
in AC mania, How to become a hacker
Reading Time: 7 mins read

Table of Contents

  • How social engineering Works?
  • Common Social Engineering Techniques:
  • Social Engineering Counter Measures
  • Social Engineering Tools
    • Social Engineering Toolkit (SET)
    • Maltego
  • Summary
How to Become a Hacker in 2020 #3| Social Engineering

Social engineering is the art of manipulating users of a computing system into revealing confidential information that can be used to gain unauthorized access to a computer system. The term can also include activities such as exploiting human kindness, greed, and curiosity to gain access to restricted access buildings or getting the users to installing backdoor software.

Knowing the tricks used by hackers to trick users into releasing vital login information among others is fundamental in protecting computer systems

 

In this tutorial, we will introduce you to the common social engineering techniques and how you can come up with security measures to counter them.

 

How social engineering Works?

 

How to Become a Hacker in 2020 #3| Social Engineering

 

  • Gather Information: This is the first stage, the learns as much as he can about the intended victim. The information is gathered from company websites, other publications and sometimes by talking to the users of the target system.
  • Plan Attack: The attackers outline how he/she intends to execute the attack
  • Acquire Tools: These include computer programs that an attacker will use when launching the attack.
  • Attack: Exploit the weaknesses in the target system.
  • Use acquired knowledge: Information gathered during the social engineering tactics such as pet names, birthdates of the organization founders, etc. is used in attacks such as password guessing.

 

Common Social Engineering Techniques:

Social engineering techniques can take many forms. The following is the list of the commonly used techniques.

 

  • Familiarity Exploit: Users are less suspicious of people they are familiar with. An attacker can familiarize him/herself with the users of the target system prior to the social engineering attack. The attacker may interact with users during meals, when users are smoking he may join, on social events, etc. This makes the attacker familiar to the users. Let’s suppose that the user works in a building that requires an access code or card to gain access; the attacker may follow the users as they enter such places. The users are most like to hold the door open for the attacker to go in as they are familiar with them. The attacker can also ask for answers to questions such as where you met your spouse, the name of your high school math teacher, etc. The users are most likely to reveal answers as they trust the familiar face. This information could be used to hack email accounts and other accounts that ask similar questions if one forgets their password.
  • Intimidating Circumstances: People tend to avoid people who intimidate others around them. Using this technique, the attacker may pretend to have a heated argument on the phone or with an accomplice in the scheme. The attacker may then ask users for information which would be used to compromise the security of the users’ system. The users are most likely give the correct answers just to avoid having a confrontation with the attacker. This technique can also be used to avoid been checked at a security check point.
  • Phishing: This technique uses trickery and deceit to obtain private data from users. The social engineer may try to impersonate a genuine website such as Yahoo and then ask the unsuspecting user to confirm their account name and password. This technique could also be used to get credit card information or any other valuable personal data.
  • Tailgating: This technique involves following users behind as they enter restricted areas. As a human courtesy, the user is most likely to let the social engineer inside the restricted area.
  • Exploiting human curiosity: Using this technique, the social engineer may deliberately drop a virus infected flash disk in an area where the users can easily pick it up. The user will most likely plug the flash disk into the computer. The flash disk may auto run the virus, or the user may be tempted to open a file with a name such as Employees Revaluation Report 2013.docx which may actually be an infected file.
  • Exploiting human greed: Using this technique, the social engineer may lure the user with promises of making a lot of money online by filling in a form and confirm their details using credit card details, etc.

 

Social Engineering Counter Measures

Most techniques employed by social engineers involve manipulating human biases. To counter such techniques, an organization can;

  • To counter the familiarity exploit, the users must be trained to not substitute familiarity with security measures. Even the people that they are familiar with must prove that they have the authorization to access certain areas and information.
  • To counter intimidating circumstances attacks, users must be trained to identify social engineering techniques that fish for sensitive information and politely say no.
  • To counter phishing techniques, most sites such as Yahoo use secure connections to encrypt data and prove that they are who they claim to be. Checking the URL may help you spot fake sites. Avoid responding to emails that request you to provide personal information.
  • To counter tailgating attacks, users must be trained not to let others use their security clearance to gain access to restricted areas. Each user must use their own access clearance. 
  • To counter human curiosity, it’s better to submit picked up flash disks to system administrators who should scan them for viruses or other infection preferably on an isolated machine.
  • To counter techniques that exploit human greed, employees must be trained on the dangers of falling for such scams.

 

Social Engineering Tools

 

Social Engineering Toolkit (SET)

SET

The Social-Engineering Toolkit (SET) is a python-driven suite of custom tools which solely focuses on attacking the human element of pentesting. It’s main purpose is to augment and simulate social-engineering attacks and allow the tester to effectively test how a targeted attack may succeed.

Features
The Social-Engineer Toolkit is an open-source penetration testing framework designed for social engineering. SET has a number of custom attack vectors that allow you to make a believable attack quickly. Supported both Linux
Mac OS X platforms.

 

Maltego

Maltego is a program that can be used to determine the relationships and real world links between: People, Groups of people (social networks), Companies, Organizations, Web sites, Internet infrastructure such as: Domains, DNS names, Netblocks, IP addresses, Phrases, Affiliations, Documents and files.

These entities are linked using open source intelligence.

Maltego is easy and quick to install – it uses Java, so it runs on Windows, Mac and Linux.

Maltego provides you with a graphical interface that makes seeing these relationships instant and accurate – making it possible to see hidden connections.

Using the graphical user interface (GUI) you can see relationships easily – even if they are three or four degrees of separation away.

Maltego is unique because it uses a powerful, flexible framework that makes customizing possible. As such, Maltego can be adapted to your own, unique requirements.

 

Video Tutorial

 

Summary

  • Social engineering is the art of exploiting the human elements to gain access to un-authorized resources.
  • Social engineers use a number of techniques to fool the users into revealing sensitive information.
  • Organizations must have security policies that have social engineering countermeasures.

 

◄ PREV             Next►

  • Author
  • Recent Posts
cryptheory
cryptheory
Core team behind Cryptheory Labs and website Cryptheory.org.
cryptheory
Latest posts by cryptheory (see all)
  • Why Online Advertisers Should Request Website Traffic Data from Google Analytics Instead of Using SEO Tools Like MOZ or Ahrefs? - March 24, 2025
  • North Carolina’s Bold Move: State Bill Proposes Investing 10% of Public Funds in Bitcoin - March 22, 2025
  • Justin Sun Stakes $100 Million in Ethereum on Lido – What Does It Mean for the Market? - March 19, 2025
Tags: hackershackinghacking course
Previous Post

Market overview 26.1. | BTC, XRP, LSK

Next Post

Binance will contribute $ 1.5 million to coronavirus victims

Related Posts

The Hottest Female Characters in PC Games: A Deep Dive into Digital Desirability
Gaming

The Hottest Female Characters in PC Games: A Deep Dive into Digital Desirability

June 5, 2025
Bitget CEO: AI token market could reach 60 billion USD by 2025
AC mania

Bitget CEO: AI token market could reach 60 billion USD by 2025

January 16, 2025
Huawei's HarmonyOS NEXT brings digital yuan to 1 billion Users - The future of digital payments begins!
AC mania

Huawei’s HarmonyOS NEXT brings digital yuan to 1 billion Users – The future of digital payments begins!

November 4, 2024
Binance Adopts Amazon’s Artificial Intelligence to Enhance Its Services
AC mania

Binance Adopts Amazon’s Artificial Intelligence to Enhance Its Services

November 1, 2024
Coinbase Launches New AI Agent Creation Tool to Handle Cryptocurrency
AC mania

Coinbase Launches New AI Agent Creation Tool to Handle Cryptocurrency

October 29, 2024
Top crypto ChatGPT plugins
AC mania

Top crypto ChatGPT plugins

October 9, 2024
Despite a bumper 16.6 billion USD profit, NVIDIA shares underperformed
AC mania

Despite a bumper 16.6 billion USD profit, NVIDIA shares underperformed

August 30, 2024
Cybersecurity Manager salary - What to expect?
AC mania

Cybersecurity Manager salary – What to expect?

July 10, 2024
6 Free Generative AI Tools That Are Great for Beginners
AC mania

7 Free Generative AI Tools That Are Great for Beginners

June 28, 2024
Please login to join discussion
Track all markets on TradingView
Score: 0
Game Over

Popular

Analysis & Trading Tips June 10, 2025: Dogecoin Is Barking Again

Analysis & Trading Tips June 10, 2025: Dogecoin Is Barking Again

June 10, 2025
Staking: Is it Just a Fancy Ponzi Scheme? Let's Get Real.

Staking: Is it Just a Fancy Ponzi Scheme? Let’s Get Real.

June 11, 2025
Solana On-Chain Frenzy: New Addresses, Spikes, and Degens Running Wild

Solana On-Chain Frenzy: New Addresses, Spikes, and Degens Running Wild

June 12, 2025
How to Trade Meme Coins in 2025: A No-BS Guide for Degens and Smart Investors Alike

How to Trade Meme Coins in 2025: A No-BS Guide for Degens and Smart Investors Alike

June 9, 2025
Who Really Makes Bank on Memecoins – And Why It Ain't You, You Beautiful Degenerate

Who Really Makes Bank on Memecoins – And Why It Ain’t You, You Beautiful Degenerate

June 4, 2025
Bitcoin Price Analysis & Trading Tips – June 9, 2025

Bitcoin Price Analysis & Trading Tips – June 9, 2025

June 9, 2025
SOL's Big F***ing Breakout: Why Solana's About to Send You to the Moon

SOL’s Big F***ing Breakout: Why Solana’s About to Send You to the Moon

June 10, 2025
Ethereum Price Analysis & Trading Tips: Triangle Squeeze and RSI Shenanigans – WTF Happens Next?

Ethereum Price Analysis & Trading Tips: Triangle Squeeze and RSI Shenanigans – WTF Happens Next?

June 18, 2025
The Hottest Female Characters in PC Games: A Deep Dive into Digital Desirability

The Hottest Female Characters in PC Games: A Deep Dive into Digital Desirability

June 5, 2025
Dogecoin's Wild Ride: A Charts-and-Giggles Exposé on Who Really Got Rekt (It Was Probably You)

Dogecoin’s Wild Ride: A Charts-and-Giggles Exposé on Who Really Got Rekt (It Was Probably You)

June 6, 2025

⭐ What Type of Crypto Investor Are You? (v2)

1. How do you DYOR (Do Your Own Research)?

2. Your first reaction to a 10x pump?

3. What’s your opinion on memecoins?

4. Where do you stake your crypto?

5. What’s your exit strategy?

6. How do you pick your next investment?

7. Favorite kind of airdrop?

8. What’s your approach to NFTs?

9. How do you store your crypto?

10. What's your long-term crypto goal?

Crypto News

Bitcoin

Ethereum

Altcoins

Cryptocurrency

Platforms for Copy Trading

Platforms for Grid Trading

Glossary of trading and crypto terms

Crypto Portfolio Tracker

 

Cryptheory Labs Projects

Guest Post for Free

On our website, you can share your opinions and insights. This feature is reserved for non-promotional articles. We are already working on a system for donations and rewarding every author.

This website is here for those of you who want to be at the forefront of innovation and new technologies like Bitcoin. But first, we need to tackle the challenges and survive in the unforgiving world of crypto assets. THIS IS CRYPTHEORY!

Follow Us

  • Terms Of Use
  • Privacy Policy
  • About us
  • Contact us

© 2024 Cryptheory - F**k the forex, we want gains!

Shiba Inu loading
No Result
View All Result
  • Cryptocurrency List
  • Cryptocurrency
    • Cryptocurrency Exchanges
      • Top exchanges for trading Bitcoin derivatives
      • How to buy bitcoin without KYC
      • How to Trade Bitcoin – best platforms
      • Best platforms to buy Bitcoin by debit or credit card
      • Platforms for Grid Trading
      • BYDFi: Review and Guide
      • BingX: Review and Guide
      • Kraken: Review and Guide
      • Bybit: Review and Guide
      • Bitpanda: Review and Guide
      • Phemex: Review and Guide
      • Huobi: Quick Guide
      • Binance: Review and Guide
    • Bitcoin
    • Tether
    • XRP
    • Dogecoin
    • Avalanche
    • Stellar
    • The Open Network
  • crypto news
  • Crypto Exchanges Info
  • Analysis
  • Attractions

© 2024 Cryptheory - F**k the forex, we want gains!

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.